Buscar
Mostrando ítems 1-10 de 15
Artículo
Measuring Performance in Knowledge Intensive Processes
(ACM Digital Library, 2019)
Knowledge-Intensive Processes (KIPs) are processes whose execution is heavily dependent on knowledge workers performing various interconnected knowledge-intensive decision-making tasks. Among other characteristics, KIPs ...
Artículo
Automatic verification and validation wizard in web-centred end-user software engineering
(Elsevier, 2017)
This paper addresses one of the major web end-user software engineering (WEUSE) challenges, namely, how to verify and validate software products built using a life cycle enacted by end-user programmers. Few end-user development ...
Artículo
A Survey on Energy Expenditure Estimation Using Wearable Devices
(ACM, 2020-09)
Human Energy Expenditure (EE) is a valuable tool for measuring physical activity and its impact on our body in an objective way. To accurately measure the EE, there are methods such as doubly labeled water and direct and ...
Artículo
Blockchains for Business Process Management - Challenges and Opportunities
(ACM Digital Library, 2018)
Blockchain technology offers a sizable promise to rethink the way interorganizational business processes are managed because of its potential to realize execution without a central party serving as a single point of trust ...
Artículo
CrimeNet: Neural Structured Learning using Vision Transformer for violence detection
(Elsevier, 2023-02-02)
The state of the art in violence detection in videos has improved in recent years thanks to deep learning models, but it is still below 90% of average precision in the most complex datasets, which may pose a problem of ...
Artículo
Enabling customers engagement and collaboration for small and medium-sized enterprises in ubiquitous multi-channel ecosystems
(Elsevier, 2014)
Over the last few years, we have encountered an exponential growth in online communication opportunities. Organizations have more and more ways to connect and engage with their current or future customers. The existence ...
Artículo
An approach for deploying and monitoring dynamic security policies
(Elsevier, 2016)
Security policies are enforced through the deployment of certain security functionalities within the applications. When the security policies dynamically change, the associated security functionalities currently deployed ...
Artículo
Reverse engineering language product lines from existing DSL variants
(Elsevier, 2017)
The use of domain-specific languages (DSLs) has become a successful technique to develop complex sys tems. In this context, an emerging phenomenon is the existence of DSL variants, which are different versions of a DSL ...
Artículo
A template-based approach for responsibility management in executable business processes
(Taylor and Francis, 2018)
Process-oriented organisations need to manage the different types of responsibilities their employees may have w.r.t. the activities involved in their business processes. Despite several approaches provide support ...
Artículo
Dynamic Reconfiguration of Security Policies in Wireless Sensor Networks
(MDPI, 2015)
Providing security and privacy to wireless sensor nodes (WSNs) is very challenging, due to the heterogeneity of sensor nodes and their limited capabilities in terms of energy, processing power and memory. The applications ...